How vulnerable are U.S. websites to attack? Who are our potential cyberenemies? Is there more to come? The answers aren't comforting: Computer and homeland security experts now warn of a broader cyberwar if the U.S. launches military strikes on Syria. Frank Cilluffo believes the Syrian Electronic Army will likely strike again -- and might have help.

The Senate has been bickering all day over how to confirm President Obama's nominees for various executive-branch positions. And it's worth taking a step back and asking: Why are there so many jobs that require Senate confirmation, anyway?

Janet Napolitano is leaving the department of Homeland Security. But she's not the only one who's gone. No less than 15 leadership positions across DHS are now vacant - or soon will be. And there doesn't seem to be any hurry to fill them.

The Russians have a way of dealing with men like Edward Snowden. “First, we would ask him questions to which the answers are already known — that is to check his truthfulness,” said Oleg Kalugin, a former major general in the Soviet KGB. “If he really knows what he says he does, if he is telling the truth … later they would ask something which is less known. Finally, they will let him say whatever he wants to say.”

Many members of Congress, despite possessing security clearances and repeatedly voting to grant legal authority to monitor civilian activities, have said over the past week that, in effect, they knew less about some key aspects of American intelligence gathering than Edward Snowden.

John Pistole emphasized that the nature of the primary threat against US aircraft -- improvised explosive devices (IEDs) -- and the need for international cooperation to defeat plots uncovered by intelligence justify a recent TSA decision to synchronize items prohibited onboard US airliners with the international community and to allow small knives onboard commercial airplanes.

In a blow to the US defense industry, Chinese hackers have reportedly stolen confidential details on highly-sensitive advanced weapons systems, including missile defenses, fighter jets and combat ships.

A previously undisclosed portion of a U.S. Defense report lists the specific weapons system designs that it says have been at least partially compromised by Chinese hackers -- from the most advanced fighter plane in history to America's missile defense systems.

Since his arrival as dean in 2010, Doug Guthrie has tried to make the most of his business school's Washington location. By focusing on subjects such as healthcare, which involves collaboration from business and government, he hopes to set the George Washington University School of Business apart from its peers.

The growing threat of cyber attacks has captured the attention of governments and boardrooms worldwide. They have a shared interest in tackling the myriad established and nascent online threats. These range from espionage - the theft of intellectual property through spyware - to sabotage, through the import of malware to their systems.

A group of top cybersecurity experts, including high-ranking officials from the government and private sector, convened at the George Washington University on April 26 for the first of a series of conferences on cybersecurity, discussing the challenges in addressing cyber threats, the importance of public-private partnerships and the efforts, possibly including legislation, that seek to address what many consider an ever-increasing risk to national security.

The United States has spent billions of dollars to prevent terrorists from obtaining a weapon of mass destruction even as the bombings in Boston further show that a nuclear weapon or lethal bioagent is not necessary for causing significant harm.

Americans who've grown accustomed to rigorous security procedures since the 9/11 attacks may have to endure new measures following the Boston Marathon bombings, but experts on Tuesday warned that no amount of extra precautions can guarantee absolute safety from a determined terrorist.